In the modern enterprise, data security is often discussed using a complex lexicon of acronyms—DLP, DDR, DSPM, and many others. While these acronyms...
NIST invites the cybersecurity and IoT communities to join a discussion on updating Foundational Cybersecurity Activities for IoT Device Manufacturers (NIST IR 8259)...
Oct 18, 2024Ravie LakshmananInsider Threat / Cyber Espionage
North Korean information technology (IT) workers who obtain employment under false identities in Western companies are...
Oct 18, 2024Ravie LakshmananThreat Intelligence / Phishing Attack
Threat actors are leveraging fake Google Meet web pages as part of an ongoing malware campaign...
Oct 18, 2024Ravie LakshmananCyber Intelligence / Critical Infrastructure
Cybersecurity and intelligence agencies from Australia, Canada, and the U.S. have warned about a year-long campaign...
Oct 18, 2024The Hacker NewsWebinar / Data Protection
Picture your company's data as a vast, complex jigsaw puzzle—scattered across clouds, devices, and networks. Some...
Oct 18, 2024Ravie LakshmananThreat Intelligence / Browser Security
Microsoft has disclosed details about a now-patched security flaw in Apple's Transparency, Consent, and Control (TCC)...